Testimonials

We love our clients, and our clients love us!

Email safety: Firewalls and antivirus are great

Email safety: Firewalls and antivirus are great, but what about your employees

The Verizon Data Breach Investigations report states that emails are the primary source of two-thirds of malware. Email is an easy target simply because there is more human touch involved in the case of emails. There’s always a stray chance that someone will end up clicking on a phishing link or downloading the wrong attachment or simply including sensitive, confidential information in an unencrypted email. The first step to securing your email systems is training your employees. Train your employees to identify harmful email messages and to be aware of your firm’s IT protocols and rules. There are 4 major ways in which your employees may end up compromising your email security. These are

    • Falling for phishing scams: These emails will appear to have come from an authentic source and urge the reader to take an action. Usually the action involves clicking on a link and/or sharing sensitive information via an online form that looks authentic. The phishing links and the webpage clone the original site so well that it is easy to mistake them for their authentic counterparts. For example- an email that looks as if it is from the IRS, asking for sensitive financial data, or an email that seems to be from the bank asking you to log into your account, etc.
    • Mistaking hacked emails to be authentic ones: These emails are actually from an authentic sender account, but their account may have been hacked. One of the ways to spot such email messages is if ‘something feels amiss’. For example, an email that’s ridden with typos, spelling and grammar errors, or if the writing style is different, or includes an unexplained instruction to download an attachment, fill a form or install a patch.
    • Not following strict password hygiene: There are 2 angles to this. First is password sharing. Sharing passwords indiscriminately puts your email systems at risk. Often, people trust their coworkers and end up sharing system or email passwords without realizing the possible consequences. Sometimes, it is just so much easier to share the password than follow the protocol. For example, Bob from sales is too busy to prepare his commission report. So, he gives his password to Lisa from accounting so she can calculate his commission for the month and Lisa shares with her team so they can work on the reports. See…before you know it 3 other people apart from Bob have access to his system including his emails!The second issue in password hygiene pertains to ignoring password basics. For example, having passwords that are too simple or obvious such as dictionary words, names, etc. or not changing passwords as recommended or having the same password for multiple accounts.
  • Exposing their own devices to safety threats and then using them for work purposes due to the BYOD environment: This is a threat brought into the picture due to the flexibility-oriented culture of the modern workplace. Businesses allow their employees to work from anywhere, using their own devices. For example, someone could be accessing and replying to an email from work, using their phone or iPad, connected to the open wifi at the mall’s food court. The risk such open networks bring to the table is unimaginable.

As discussed in the beginning of this blog, emails are a soft target because of the human element. You can organize classroom training sessions to educate your employees about your IT usage policies related to password management, use of personal devices, data sharing and internet access. You can also conduct IT drills and workshops to help your employees identify possible IT security threats and steer clear of those. If you don’t have the resources to do this, check with a MSP in your area. They might be able to help.

Risk assessment: A Value model


Risk assessment means looking at all the conditions, situations and threats that exist that could damage or bring down your business. Risk assessment is all about identifying the external and internal threats that exist and measuring the likely consequences if that threat becomes reality. A data security risk assessment would identify what data you have, how you use it, how confidential it may be, how it is affected by regulations and the ways it could be compromised. A major focus of a data security assessment is cybercrime.

In terms of developing an IT staff, the alternative approach to building out a team is to determine your IT staffing needs in terms of risk assessment. That means evaluating risk and directing staffing resources to those areas where the risk is greatest and the consequences most severe. Basically, it is an evaluation on the ROI of your IT staffing in light of identified risk. In particular, what is the return on your risk management investment? The goal is to evaluate risk in light of business and operational consequences. Put simply, which point of failure leads to the most destructive consequences. Once that is determined your limited IT resources can be directed at those most critical areas.

In the short term, you can try to find the specific applicants that have what you need to plug the holes. Is that workable given the challenges to hiring? The market is very competitive.

The alternative is an MSP. Using a Managed Service provider for at least some of your most critical needs can be a very effective way of targeting your IT resources to where you are most vulnerable.

You have more freedom to move resources to where they are most needed.

Opting for an in-house IT team limits you in terms of scalability. You cannot just add or reduce the strength of your IT team anytime. Choosing a managed services provider, however, provides the flexibility to scale up or scale down your IT investment to suit your business needs.

You are better prepared for IT emergencies

Having a service contract with an MSP helps you tackle IT emergencies better because you get access to top-level IT expertise. An MSP’s core business is IT so they are naturally more knowledgeable and up-to-date when it comes to the latest IT challenges, including cybercrime. Plus, an MSP can deploy more resources if need be to solve your IT emergency, helping your business get back on its feet sooner.

You will be ahead of the curve

The IT industry is constantly evolving. The in-house IT team may find it challenging to keep up with the latest trends and norms of the IT industry as they will be caught up in managing the day-to-day IT activities at your office. Also, IT is a very broad field, and only a diverse IT team has the depth to cover all of the different areas. With an MSP, you don’t have to worry about how technology is changing. A good MSP will not only be up-to-date with the latest in tech but also advise you on what tech changes you need to make to stay ahead of the curv

The lesson for hiring IT is that you should focus resources, be they in-house or external, on the areas where your business is at highest risk from a single point of failure or a cyber attack. Not all IT needs are equal, and traditional models don’t always recognize this. A Managed Service Provider can also assist you in determining a hierarchy of your IT needs.

Staffing should address risk first and foremost

For any business, but especially a smaller one without deep pockets, the consequences of some disaster may mean the end of the business. As a result, risk evaluation becomes critical. There are an endless variety of events, from mishaps to major disasters that challenge your viability. Risk management inventories all of the possible risks that could befall the organization and places them in a hierarchy of significance. At the top are single points of failure disasters or extreme events that would shut down the business, at least temporarily. Risk management then works to channel limited resources toward mitigating the most serious risks. Here are some examples of risk in the IT area that could be especially damaging if left unprotected

Data Security and Cybercrime –

  1. Loss of data – Failed backups or human error can lead to lost data. Every business needs to have the IT expertise to ensure that quality backups are maintained, preferably in real-time
  2. Data breaches – More significantly, data is constantly at risk from crime. From malware to ransomware, viruses and cyber attacks can destroy a small business. Consequently, quality IT support is most critical in this area. It should be an issue of highest priority.

Hardware redundancy – Your entire physical IT infrastructure represents a vulnerability. Single points of failure could shut down your business. Proper design of your infrastructure, and 24/7 monitoring of it is, again, a risk mitigation factor. How much evaluation has been done to determine your level of risk?Natural and human-made disasters – How prepared is your IT infrastructure to continue operations in the event of a flood, fire, or natural disaster that prohibits access to your physical location? How would you handle a long-term power of broadband outage? IT professionals skilled in disaster recovery can help you mitigate the risk in the face of a major event.

The point here is not to list all the possible risks you face, but to recognize that IT support should be focused on the most critical areas. Whether you bring them in-house or use the services of an MSP, resources should be directed first at areas where the risk is greatest.

How can an MSP help support a risk-focused IT strategy?

  1. Hiring individual in-house support can be expensive and slow – Given the tight labor market, finding ideal candidates can be exceptionally difficult, and as a consequence, too expensive. An MSP represents a faster way to bring on support and can be utilized only when and where the most critical services are needed.
  2. Up-to-date support – Over-worked in-house IT staff in a small company may be too busy putting out fires to keep up with the latest developments in specific corners of their field. As a result, you may lack the knowledge depth needed on narrow but critical areas. IT is a very broad field, and only a diverse IT team has the depth to cover all of the different areas. With an MSP, you don’t have to worry about how technology is changing. A good MSP will not only be up-to-date with the latest in tech but also advise you on what tech changes you need to make to stay ahead.
  3. Scalability – The size of your in-house IT support staff is, in the short term, static. If you experience peak demand times, resources can be stretched to the point of being overwhelmed. .Choosing a managed services provider, however, provides the flexibility to scale up or scale down your IT investment to suit your business needs.
  4. 24/7 monitoring and availability – Until your organization gets big enough, an in-house IT staff cannot be available 24/7. Nor can it provide 24/7 monitoring for that part of your business that must be functional all the time. An MSp has the resources, because of economies of scale.

    In the end, don’t think of IT support as “IT Hiring” instead, think of it as staffing. What is the best use of limited resources to meet your most immediate vulnerabilities? That is the best perspective to take on IT support when resources are limited.

Forego the standard IT staffing model?

From the outset, even the smallest start-up is reliant on an IT infrastructure. Digital technology cannot be avoided. For small-to medium-sized businesses, developing and bringing on staff to support that IT infrastructure is often a low priority compared to ramping up operations and meeting the revenues goals necessary to stay operational. Resources to address IT needs may not be available (for at least, perceived to be unavailable) Management is focused on revenue growth and meeting operational and business requirements. Management may also be incentivized to direct available funds in these directions, rather than building out a robust and sufficiently risk averse IT infrastructure. Also, management may not have the background that provides sufficient experience to identify areas where IT staffing is necessary to maintain a stable and sustainable business.

In a small- to medium-sized business beginning to explore the development of an IT support staff, or even in a large organization undergoing significant transformation, there may be a tendency to begin the process of IT staffing with a top level individual–a CTO, IT director or IT manager. Once hired, that individual would be relied on to begin the process of building out an IT staff.

Data backup planning: 10 best practices for protection

I was this article today and thought I would share & add my two cents worth.

For most organizations, loss of business data could spell disaster. Possible outcomes include reputational damage, regulatory penalties, loss of competitive advantage and damage to customer service. Ultimately, it could mean the end of the business.

 

Here’s a look at the top five tape storage backup and recovery tips of 2009. Learn about tape backup and tape trends in 2009 with these top tips.

No business wants to lose data — of any kind — so it’s essential that all relevant data and databases are protected. The most effective way to achieve that goal is to establish data backup planning procedures with secure technology that not only protects data, but enables it to be quickly and securely accessible.

Here are 10 best practices for optimizing data backup planning activities.

Establish data backup, data retention and data destruction policies. These three policies comprise the foundation of a secure data backup program. Policies are also essential when an audit is being conducted. Data backup translates to the process of identifying data to be backed up, the frequency and timing of backups, the tools and technology to be used for backups, and the process for accessing backed-up data. Data retention defines what data will be retained, the format in which the data is stored and the duration of the storage. Finally, data destruction defines what data is to be destroyed, when it takes place, and the process for destroying the data and the media on which it is stored.

Plan for dramatically increasing amounts of data. Regardless of what your current data storage requirements are, plan your backup needs on the basis that your capacity is likely to grow annually. Whatever storage resources you have in place now — whether on-site or remote/cloud — be sure you can scale quickly and cost-effectively if needed.

Ensure backed-up data is secure and protected from unauthorized access. We have seen far too many examples of cybersecurity breaches where large amounts of data are stolen or compromised. Whether data is stored on-site or remotely, ensure the resources needed for confidentiality, integrity and availability enable data to be protected from unauthorized access, prevent alterations or changes, and allow access anytime and from anywhere via secure technologies.

Build a backup environment composed of multiple elements. While many organizations still use on-site physical data storage arrangements, such as file servers, NAS and tape, the growth and acceptance of remote and cloud-based storage options are significant. Costs for remote storage make those options increasingly affordable, and assuming their security arrangements are robust, remote storage is a major best practice. The 3-2-1 Rule for data backup planning states there should be at least three copies of data available, stored on at least two storage devices and that at least one of those devices is located remotely. Major cloud storage providers, such as Amazon, IBM and Microsoft, offer an array of options and pricing plans.

Optimize backup plans and procedures to business requirements. It’s simple to have a backup program that requires once-daily backups of incremental data changes and once-weekly backups of all data. But if your organization is subject to regulatory requirements, you may need to have a backup arrangement for the regulated data and another one for other business data. Some data may need to be backed up or replicated almost immediately, while other data can be backed up daily or even weekly. Your data backup program should be based on your business needs.

Back up all your operating environments. Today’s businesses use a variety of operating environments. The key trend is to virtualize critical business operations. In such environments, it is essential that backup programs are powerful, cost-effective, secure and fast. Naturally, such environments have a cost associated with them. Take a close look at the total cost of ownership when conducting your data backup planning.

Consider tape backup. Sophisticated remote and cloud-based data backup services can be costly, whereas tape can be a cost-effective alternative, especially for data that is not needed daily or even hourly for business operations. [This point couldn’t be more off. Yes, tape is cheap but 50% of tape recoveries fail.  Even today after many advances and capacity 50% still fail for ALL sizes of organizations over the last 50 years]

Employ a backup architecture that supports data compression and deduplication to reduce infrastructure needs. With ever-increasing volumes of data to be stored, consider arrangements to conserve storage requirements, such as data compression and deduplication. The cost for such technologies may help defer a major — and costly — investment in backup technology.

Implement fast and secure access to backed-up data. With the investments being made in backup infrastructures, a key component is to have technology that speeds up the ability to find and access data that has been backed up.

Test backup plans regularly. No matter how robust your backup strategy is or how much diversity is in place for storing data, it’s still essential to test your backup plan, especially if a disaster has occurred. Just as a technology disaster recovery (DR) plan should be tested at least annually, so should your data backup plan. Ideally, the data backup planning element should be part of a DR test.

Overall a good article. Unfortunately, almost all organizations that I encounter before I get involved don’t follow all the most important pieces, follow-up, test and check to make sure it will work when you need it.

Mirrored Storage | Secure CLOUD Solutions for Business | mirroredstorage.com
Mirrored Storage provides cloud backupcloud storage and a full range of Information Technology services to businesses in Dallas, Fort Worth and surrounding area.
By John Neibel | mirroredstorage.com

World Backup Day: Is it needed or not? Tech experts share their views

 

Tech experts react to annual World Backup Day.

Source: http://www.cbronline.com/news/cybersecurity/world-backup-day-needed-not-tech-experts-share-views/

World backup day

As we reach the annual World Backup Day of the year, it is important to focus on the importance of backing up to avoid losing important files that could have been saved with a simple back-up procedure.

I, for one totally know how this feels following my recent incident of dropping my phone down the toilet, to which the phone became instantly inactive losing over 2000 pictures, files, A LOT! All of which could have been saved if I had just backed up to cloud, but yes I’ve learnt the hard way.

So now here’s the question- shouldn’t back-up day be every day? Does a day dedicated to it really express its true importance and effects?

Well, CBR put together a list with what some experts in this field have to say to answer this mystery.

 

GDPR

In aid of raising awareness of the risks of losing data and what can be done to prevent it, Cloud computing company, Rackspace shares its views on the importance of UK businesses backing up their data.

Read more: How Organisations Should Be Preparing for the GDPR

Lillian Pang, Senior Director of Legal and Data Protection Officer, Rackspace said: “Every day data becomes more valuable to businesses, with more and more created at an ever-increasing speed. While the message to ‘back up’ data is beginning to resonate, this in turn means that businesses are up to their necks in large amounts of data that needs protecting. And this is just the data they know about, without even thinking of what is going on in shadow IT.

GDPR“Initiatives like World Backup Day serve as a timely reminder to businesses not only of the need to back up data, but also to protect and carefully manage this invaluable asset. Like all risk based strategies, businesses must know what really needs to be backed up in the first place. In other words, businesses must understand what the ‘mission critical data’ actually is.

 “The sheer scale of data in circulation means that a simple backup tool is no longer enough in minimising the risk of valuable file or database goes missing or becoming corrupted. In addition, the process of backing up data has become more complex than it used to be because companies are more conscious than ever of the compliance regulations they have to adhere to.

“ If processes aren’t in place to meet legislation like GDPR, it’s not just reputational damage that organisations need to worry about – high fines could also have a significant business impact. Businesses need to dedicate time and resource to implement and execute on the processes in place for identifying and responding quickly to system degradations or failures.”

 

Disaster Recovery

In response to the importance of regular backups, Cloud service provider, iland shares the idea that backing up data is an easy and hassle-less procedure that can be done daily or any day of the week. Still yet, many organisations and individuals ignore the process for different reasons.

Brian Ussher, President and Co-Founder, iland said: “On World Backup Day, it’s a good time to recognise how far the market has come in protecting mission-critical business data. The scalability, flexibility and on-demand nature of the cloud means that backup and DR strategies that were previously only available to large enterprise customers are now also within the reach of small and medium sized businesses.

“Indeed, many of our customers have evolved from onsite backup to cloud backup to a full cloud-based disaster recovery strategy.  While risks ranging from the dramatic; hurricanes, storms and ransomware attacks to the mundane; power outages, unauthorised changes and human error are only increasing, companies of all sizes can be confident that the technology and expert assistance is available to help them achieve IT resiliency and business continuity.”

What do Veeam and Hitachi Data Systems have to say?

Data Centre Action

Again, in response to World Back up Day itself, many look at the risks of making organisations back up on the same day. Not only could it cause a crash in backup locations, but who can be so sure that the process of large amounts of data transfer at once will not cause users files to end up in different locations.

This is why files should consistently be stored in secure locations.

Jon Leppard, Director, Future Facilities said: “A comprehensive backup policy should involve keeping copies of data on a local server or hard drive, but most importantly it should also be stored in an external location –usually a datacentre. But even datacentres have capacity limits on the volume of data they can store at any one time. If everyone were to back up at the same time there would be considerable pressure on network bandwidth and global data centre capacity.

“Data centre operators must ensure they have a backup strategy in place, in terms of predicting the impact of a sudden spike in demand. After all, backup must be failsafe, or it is of little value. With that in mind, maybe encouraging everyone to backup on one day of the year is not the right approach.”

 

Availability Gap

As we have a specific day set aside to encourage backing up, it should be just as important to demand continuous availability, especially as businesses are now required to adjust to become the Always-On enterprise to allow 24/7 availability.

For this reason, it is advised that World Availability Day should be imposed the day before World Backup day and should also be given more awareness, according to Veeam.

Richard Agnew, VP NW EMEA, Veeam said:  “In today’s connected world, businesses need to ensure availability to avoid a breakdown in operations.

“The recent AWS outage (which took down many large websites for several hours) paints a clear picture that businesses cannot afford to have unavailable data. Not only does brand reputation take a toll, businesses are also left out of pocket. Organisations have become more aware of the dreaded ‘availability gap’ emerging – which includes data loss, extended recovery times, unreliable data protection, and a lack of knowledge of the IT environment leading to unplanned issues and downtime.

“Organisations have implemented innovative solutions and planning which needs to be complemented with processes that can ensure availability at all times. With AI, machine learning and the Internet of Things driving IT modernisation, it’s imperative that data and functionality is protected at all times, and that’s why having a secure website is important, but you can achieve this with the right hosting, and if you don’t know how to host a websites there are guides such as the Introduction to Web Hosting site you can find online and is perfect for this purpose.

“The boardroom discussions need to evolve from the backup and recovery strategy to availability. It’s high time for businesses to take action and introduce an IT strategy that ensures their business is Always-On 24/7.”

 

Data Storage

For businesses especially, secure enterprise data storage should be of key importance especially considering the upcoming GDPR effects which are due to take place.

Steve Lewis, CTO UK&I, Hitachi Data Systems said: “With just a year to go before organisations operating in the EU must become GDPR-compliant, it’s now more important than ever for companies to focus on safely and securely storing organisational and customer data.

“The amount of data captured by businesses every day can be a huge asset, unlocking valuable insights and creating competitive advantage. However, this same information can also cause serious headaches for those tasked with securely storing and managing it – and GDPR is putting a time limit on the need to get this right.

“As a result, it’s no surprise that many organisations are looking to new solutions to help them navigate the regulatory landscape – with Data Protection Officers increasingly being hired to guide organisations and provide a bridge between the IT department and the boardroom, and companies looking for technology solutions to help them better manage and govern the data they hold.”

Amazon Cloud Failure

Usually people don’t notice the “cloud” — unless, that is, it turns into a massive storm. Which was the case Tuesday when Amazon’s huge cloud-computing service suffered a major outage.

Amazon Web Services, by far the world’s largest provider of internet-based computing services, suffered an unspecified breakdown in its eastern U.S. region starting about midday Tuesday. The result: unprecedented and widespread performance problems for thousands of websites and apps.

While few services went down completely, thousands, if not tens of thousands, of companies had trouble with features ranging from file sharing to webfeeds to loading any type of data from Amazon’s “simple storage service,” known as S3. Amazon services began returning around 4 p.m. EST, and an hour later the company noted on its service site that S3 was fully recovered and “operating normally.”

THE CONCENTRATED CLOUD

The breakdown shows the risks of depending heavily on a few big companies for cloud computing. Amazon’s service is significantly larger by revenue than any of its nearest rivals — Microsoft’s Azure, Google’s Cloud Platform and IBM, according to Forrester Research.

With so few large providers, any outage can have a disproportionate effect. But some analysts argue that the Amazon outage doesn’t prove there’s a problem with cloud computing — it just highlights how reliable the cloud normally is.

The outage, said Forrester analyst Dave Bartoletti, shouldn’t cause companies to assume “the cloud is dangerous.”

Amazon’s problems began when one S3 region based in Virginia began to experience what the company called “increased error rates.” In a statement, Amazon said as of 4 p.m. EST it was still experiencing errors that were “impacting various AWS services.”

“We are working hard at repairing S3, believe we understand root cause, and are working on implementing what we believe will remediate the issue,” the company said.

WHY S3 MATTERS

Amazon S3 stores files and data for companies on remote servers. Amazon started offering it in 2006, and it’s used for everything from building websites and apps to storing images, customer data and commercial transactions.

“Anything you can think about storing in the most cost-effective way possible,” is how Rich Mogull, CEO of data security firm Securosis, puts it.

Since Amazon hasn’t said exactly what is happening yet, it’s hard to know just how serious the outage is. “We do know it’s bad,” Mogull said. “We just don’t know how bad.”

At S3 customers, the problem affected both “front-end” operations — meaning the websites and apps that users see — and back-end data processing that takes place out of sight. Some smaller online services, such as Trello, Scribd and IFTTT, appeared to be down for a while, although all have since recovered.

The corporate message service Slack, by contrast, stayed up, although it reported ” degraded service ” for some features. Users reported that file sharing in particular appeared to freeze up.

The Associated Press’ own photos, webfeeds and other online services were also affected.

TECHNICAL KNOCKOUTAGE

Major cloud-computing outages don’t occur very often — perhaps every year or two — but they do happen. In 2015, Amazon’s DynamoDB service, a cloud-based database, had problems that affected companies like Netflix and Medium. But usually providers have workarounds that can get things working again quickly.

“What’s really surprising to me is that there’s no fallback — usually there is some sort of backup plan to move data over, and it will be made available within a few minutes,” said Patrick Moorhead, an analyst at Moor Insights & Strategy.

AFTEREFFECTS

Forrester’s Bartoletti said the problems on Tuesday could lead to some Amazon customers storing their data on Amazon’s servers in more than one location, or even shifting to other providers.

“A lot more large companies could look at their application architecture and ask ‘how could we have insulated ourselves a little bit more,'” he said. But he added, “I don’t think it fundamentally changes how incredibly reliable the S3 service has been.”

Source: By Mae Anderson, AP technology reporter NEW YORK — Feb 28, 2017, 7:50 PM ET

Mirrored Storage | Secure CLOUD Solutions for Business | mirroredstorage.com
Mirrored Storage provides cloud backup, cloud storage and a full range of Information Technology services to businesses in Dallas, Fort Worth and surrounding area.
By John Neibel | mirroredstorage.com

Cyber Security Breaches at SMB’s in 2017

I read a very interesting article about 2017 predictions for SMB’s closing due to Cyber Attacks.  Businesses surveyed concerns have risen concerning their technology, email and even documents which can be in Word format or PDF which you can format with an sodapdf software .

It’s not just big firms like Target or Home Depot that need to worry about cyber security. Forty-three percent (43%) of all cyberattacks target SMBs.(1) Not surprisingly, our data shows they are increasingly concerned about the safety of their company’s technology and files. Most SMBs don’t have in-house experts to deal with breach issues, and the average recovery cost is $36,000. Sadly, 60% end up having to close their doors within six months of the breach (2). In 2017, this could add up to 550,000 business failures.

Sources: (1) Symantec Internet Security Threat Report 2016; (2) National Cyber Security Alliance 2016; Bank of America SBO Report 2015; The Business Journals SMB Insights; E = predicted estimate/preliminary data from SMB Insights 2017

The ONLY TRUE WAY to protect your business is with services like Data Protection solutions like we provide to our clients.  We can also help with protecting your network and many other aspects with our Proven Technology Services specifically out Network Services.

Mirrored Storage | Secure CLOUD Solutions for Business | mirroredstorage.com
Mirrored Storage provides cloud backup, cloud storage and a full range of Information Technology services to businesses in Dallas, Fort Worth and surrounding area.
By John Neibel | mirroredstorage.com

Ford Cancels Mexico Plant, CEO Says It Wasn’t Due to Trump

Video of the day!  Watch this video.  It was a great highlight, but the underlying message is not what it seems.

I predict more media manipulation on steroids for the next few years!

Mirrored Storage | Secure CLOUD Solutions for Business | mirroredstorage.com
Mirrored Storage provides cloud backup, cloud storage and a full range of Information Technology services to businesses in Dallas, Fort Worth and surrounding area.
By John Neibel | mirroredstorage.com

9 hidden Xbox One features only power users know about

The Xbox One is an incredible gaming console with the capability to do all sorts of cool things, but unless you have your finger on the pulse of the latest Xbox news, you might be missing out on a few of its best features, including the ability to play with a projector instead of a monitor.

Here are nine especially great features of the Xbox One that you may not know about.

Tim Mulkerin contributed to an earlier version of this story.

  1. Play your saved games on any Xbox One.

  2. See how much data your console is using.

  3. Continue your Xbox 360 games on your new Xbox One.

  4. Use your phone or tablet as a controller.

  5. Stream Xbox One games to your Windows 10 PC.

  6. Expand your storage with an external hard drive.

  7. Watch TV with Sling and ditch your cable plan.

  8. Plug your cable box directly into your Xbox One and make it the home base for all things TV and gaming in your household.

  9. Set any achievement as a background on your home screen.

Source: http://www.businessinsider.com/xbox-one-features-only-power-users-know-about-2016-12?r=UK&IR=T/#plug-your-cable-box-directly-into-your-xbox-one-and-make-it-the-home-base-for-all-things-tv-and-gaming-in-your-household-8

Mirrored Storage | Secure CLOUD Solutions for Business | mirroredstorage.com
Mirrored Storage provides cloud backup, cloud storage and a full range of Information Technology services to businesses in Dallas, Fort Worth and surrounding area.
By John Neibel | mirroredstorage.com

twitter feed

Stay tuned for the latest news from our twitter feed.

connect via social media

Don't forget to follow us & get in touch.